Three-Party Encrypted Key Exchange: Attacks and a Solution

Publication Type:

Journal Article

Source:

ACM Operating Systems Review, Volume 34, Issue 4, p.12-20 (2000)
Share/Save